Skip to main content

Virtually all banking web apps are vulnerable to hackers, study finds

Using a computer today feels a bit like walking through a minefield, at least when we are using them to access or share personal and sensitive information. That is particularly true for our financial information, where the wrong person getting access to our data could mean a whole lot of pain. According to a recent study, using our bank’s web application is one of the biggest mines that we probably don’t know about.

The news comes via security firm Positive Technologies, which looked at web application security in a recent report. The results are disturbing, to say the least, with every web application tested in 2017 having at least one vulnerability, and with 94 percent having at least one vulnerability that was characterized as “high-severity.”

According to Leigh-Anne Galloway, Positive Technologies’ cybersecurity resilience lead, “Web applications practically have a target painted on their back. A large number of unfixed, exploitable vulnerabilities is a windfall for hackers, who can use these flaws to steal sensitive information or access an internal network. Fortunately, most vulnerabilities can be discovered long before an attack ever happens. The key is to analyze application source code.”

The results were even worse when looking strictly at banking and finance web applications, which made up 46 percent of the test group. Every one of the banking and finance web applications covered in the report suffered from high-severity vulnerabilities. As the organization points out, these applications are also the most attractive to hackers and so their vulnerabilities are of particular concern.

Furthermore, the data shows that 87 percent of banking and government web applications are open to attacks against users, with cross-site scripting vulnerabilities present in 82 percent of the tested web applications. That makes them good targets for phishing attacks that can infect user PCs with malware.

Clearly, the banking industry has work to do to clean up its web applications. As always, the presence of these kinds of vulnerabilities serve as a reminder that we all need to be constantly vigilant in monitoring our financial data, because we never know which online transaction will be the one that opens us up to an attack.

Editors' Recommendations

Mark Coppock
Mark has been a geek since MS-DOS gave way to Windows and the PalmPilot was a thing. He’s translated his love for…
How to update your Gmail picture on desktop and mobile
A man holding a teacup staring at laptop screen.

There are lots of reasons why you'd want to change your Gmail profile picture. Maybe you have a great, new selfie you want to show off. Or you just want to update your work email with a photo that's recent and professional-looking. Whatever the reason, we can help you update your Gmail picture in just a few quick steps. We've also got you covered whether you choose to change your photo via Gmail's desktop website or through its mobile app.

Read more
How to build your own GPT chatbot without coding
Infinix Zero 30 5G Android phone in gold color with ChatGPT virtual assistant.

For $20 per month, a ChatGPT Plus subscription unlocks far more than just access to GPT-4. With a little know-how, you’ll actually be able to use some of OpenAI’s more advanced features to build a custom GPT chatbot all your own. We did it ourselves, and the results were simply astounding! And while this may sound like an intimidating task to undertake, you won’t even need to know any coding.

Read more
How to change your MAC address on Windows and Mac
The TP-Link Archer AXE7800 tri-band Wi-Fi 6E router in a room.

Each and every web-connected component in your household has a MAC address. One can think of these 12-digit identifiers as digital name tags that computers, smartphones, tablets, and smart TVs use to say “present” on our home Wi-Fi networks. MAC addresses are also integral in maintaining a safe and reliable gateway to the internet.

Read more